Summary is AI-generated, newsdesk-reviewed
  • Axis Communications signs CISA Secure by Design, enhancing cybersecurity transparency for AXIS OS products.
  • Axis employs the Axis Security Development Model to mitigate software security risks effectively.
  • Axis Cloud Connect ensures secure device management with SSO, MFA, and encrypted communication.

Axis Communications has committed to enhancing cybersecurity by signing the Secure by Design pledge initiated by the U.S. Cybersecurity & Infrastructure Security Agency (CISA).

This pledge advocates for transparency in cybersecurity matters associated with Axis products, aligning with the company’s aim to integrate security as a fundamental component of its offerings.

Core security requirements

The voluntary pledge from CISA encourages manufacturers to prioritise customer security by addressing seven critical areas, including implementing multi-factor authentication, reducing default passwords, and mitigating vulnerabilities.

It also covers simplifying the addition of security patches, establishing a vulnerability disclosure policy, ensuring transparency in vulnerability reporting, and enabling users to verify cybersecurity incidents involving the manufacturer’s products.

Commitment to cybersecurity

"CISA’s Secure by Design pledge aligns well with our goal of making cybersecurity a core part of what we offer," noted Johan Paulsson, Chief Technology Officer, Axis.

"By making this pledge, we affirm our continuous commitment to helping customers follow cybersecurity best practices and drive greater accountability in the physical security industry."

Security measures in Axis products

Axis incorporates vast security measures in its products, which include AXIS OS-based network

Axis incorporates comprehensive security measures in its products, which include AXIS OS-based network products, video, and device management software, as well as Axis Cloud Connect.

The company employs a dedicated Axis Security Development Model (ASDM) to mitigate security risks across the product lifecycle, complemented by bug bounty programs and a proactive vulnerability management policy.

Advanced security in AXIS OS

The AXIS OS used in various devices like cameras and access control products is engineered without default passwords and supports multi-factor authentication.

It facilitates zero-trust networking and employs robust encryption technologies such as IEEE 802.1AE MACsec, ensuring the secure operation of network protocols.

Secured video management software

The AXIS Camera Station software offers secure communication through 256-bit AES encryption

The AXIS Camera Station software offers secure communication through 256-bit AES encryption.

It supports variable user access levels and introduces features like two-factor authentication and activity monitoring logs to ensure system accountability and security. Additionally, it ensures password protection and offers granular control over device functionalities.

Device management capabilities

Axis provides several user-friendly device management solutions, including AXIS Device Manager and AXIS Device Manager Edge, to efficiently handle software updates and security configurations for numerous devices.

These tools facilitate tasks such as TLS certificate management and automated password updates, reducing human error risks.

Axis Cloud Connect platform

Axis Cloud Connect is a hybrid cloud platform designed to secure remotely managed Axis devices. It leverages secure channels like HTTPS and WebRTC with TLS encryption while integrating features such as single sign-on and multi-factor authentication to enhance security measures for My Axis accounts.

In fulfilling the CISA Secure by Design pledge, Axis remains dedicated to maintaining transparency with its customers by regularly sharing updates on the cybersecurity status of its products, thus fostering a trust-based relationship with users.

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...